Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
25/01/2025, 04:16
Behavioral task
behavioral1
Sample
6f1b10a1c174cb19fe8f439044e6f447a22f357878f8b65d3e0593aab67672d1N.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
6f1b10a1c174cb19fe8f439044e6f447a22f357878f8b65d3e0593aab67672d1N.exe
Resource
win10v2004-20241007-en
General
-
Target
6f1b10a1c174cb19fe8f439044e6f447a22f357878f8b65d3e0593aab67672d1N.exe
-
Size
2.7MB
-
MD5
730fee3e3541f5fbf39bad2dc667ea70
-
SHA1
0171c24593ec0a6bcf7905b8daeb232f5adc03cd
-
SHA256
6f1b10a1c174cb19fe8f439044e6f447a22f357878f8b65d3e0593aab67672d1
-
SHA512
aa638822f7bb6d1ab7debc5816c4dac21885716a159777a91caec748f9a21746731596bc39378c6323d168ff2d55ac610e385caf34cf2ed50488a2db2408c89c
-
SSDEEP
49152:7bA3jfxSks5WqWk9IEJKb9aUgXXNOUnkonLxB5ctEC:7bwsgql9hJfUgX8+vc6
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 27 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1148 1648 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1788 1648 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1520 1648 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2564 1648 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1552 1648 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2624 1648 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2964 1648 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1872 1648 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2904 1648 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1088 1648 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2992 1648 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2324 1648 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1028 1648 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1280 1648 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 484 1648 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 768 1648 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2252 1648 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2144 1648 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2420 1648 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2616 1648 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2148 1648 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 840 1648 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 448 1648 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2168 1648 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2028 1648 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1000 1648 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1340 1648 schtasks.exe 36 -
resource yara_rule behavioral1/memory/2928-1-0x0000000000150000-0x0000000000410000-memory.dmp dcrat behavioral1/files/0x000c000000012281-5.dat dcrat behavioral1/files/0x0007000000016d3a-24.dat dcrat behavioral1/memory/2524-28-0x00000000003B0000-0x00000000005FE000-memory.dmp dcrat behavioral1/memory/1696-59-0x0000000000DA0000-0x0000000000FEE000-memory.dmp dcrat -
Detected Nirsoft tools 2 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral1/memory/2928-1-0x0000000000150000-0x0000000000410000-memory.dmp Nirsoft behavioral1/files/0x0008000000016c80-13.dat Nirsoft -
Executes dropped EXE 4 IoCs
pid Process 2784 svchost.exe 2868 explorer.exe 2524 hyperComwin.exe 1696 smss.exe -
Loads dropped DLL 4 IoCs
pid Process 2928 6f1b10a1c174cb19fe8f439044e6f447a22f357878f8b65d3e0593aab67672d1N.exe 2928 6f1b10a1c174cb19fe8f439044e6f447a22f357878f8b65d3e0593aab67672d1N.exe 2708 cmd.exe 2708 cmd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Mail\fr-FR\Idle.exe hyperComwin.exe File created C:\Program Files (x86)\Windows Mail\fr-FR\6ccacd8608530f hyperComwin.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\dtplugin\smss.exe hyperComwin.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\dtplugin\69ddcba757bf72 hyperComwin.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\fr-FR\smss.exe hyperComwin.exe File opened for modification C:\Windows\fr-FR\smss.exe hyperComwin.exe File created C:\Windows\fr-FR\69ddcba757bf72 hyperComwin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6f1b10a1c174cb19fe8f439044e6f447a22f357878f8b65d3e0593aab67672d1N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 27 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1148 schtasks.exe 1552 schtasks.exe 2148 schtasks.exe 1340 schtasks.exe 1520 schtasks.exe 1028 schtasks.exe 484 schtasks.exe 768 schtasks.exe 2168 schtasks.exe 2028 schtasks.exe 1788 schtasks.exe 2964 schtasks.exe 2992 schtasks.exe 1280 schtasks.exe 2624 schtasks.exe 2904 schtasks.exe 2144 schtasks.exe 2616 schtasks.exe 448 schtasks.exe 1088 schtasks.exe 840 schtasks.exe 2564 schtasks.exe 2252 schtasks.exe 2420 schtasks.exe 1000 schtasks.exe 1872 schtasks.exe 2324 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2524 hyperComwin.exe 2524 hyperComwin.exe 2524 hyperComwin.exe 1696 smss.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2868 explorer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeBackupPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeBackupPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeBackupPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe Token: SeSecurityPrivilege 2868 explorer.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2928 wrote to memory of 2784 2928 6f1b10a1c174cb19fe8f439044e6f447a22f357878f8b65d3e0593aab67672d1N.exe 30 PID 2928 wrote to memory of 2784 2928 6f1b10a1c174cb19fe8f439044e6f447a22f357878f8b65d3e0593aab67672d1N.exe 30 PID 2928 wrote to memory of 2784 2928 6f1b10a1c174cb19fe8f439044e6f447a22f357878f8b65d3e0593aab67672d1N.exe 30 PID 2928 wrote to memory of 2784 2928 6f1b10a1c174cb19fe8f439044e6f447a22f357878f8b65d3e0593aab67672d1N.exe 30 PID 2928 wrote to memory of 2868 2928 6f1b10a1c174cb19fe8f439044e6f447a22f357878f8b65d3e0593aab67672d1N.exe 31 PID 2928 wrote to memory of 2868 2928 6f1b10a1c174cb19fe8f439044e6f447a22f357878f8b65d3e0593aab67672d1N.exe 31 PID 2928 wrote to memory of 2868 2928 6f1b10a1c174cb19fe8f439044e6f447a22f357878f8b65d3e0593aab67672d1N.exe 31 PID 2928 wrote to memory of 2868 2928 6f1b10a1c174cb19fe8f439044e6f447a22f357878f8b65d3e0593aab67672d1N.exe 31 PID 2784 wrote to memory of 3012 2784 svchost.exe 32 PID 2784 wrote to memory of 3012 2784 svchost.exe 32 PID 2784 wrote to memory of 3012 2784 svchost.exe 32 PID 2784 wrote to memory of 3012 2784 svchost.exe 32 PID 3012 wrote to memory of 2708 3012 WScript.exe 33 PID 3012 wrote to memory of 2708 3012 WScript.exe 33 PID 3012 wrote to memory of 2708 3012 WScript.exe 33 PID 3012 wrote to memory of 2708 3012 WScript.exe 33 PID 2708 wrote to memory of 2524 2708 cmd.exe 35 PID 2708 wrote to memory of 2524 2708 cmd.exe 35 PID 2708 wrote to memory of 2524 2708 cmd.exe 35 PID 2708 wrote to memory of 2524 2708 cmd.exe 35 PID 2524 wrote to memory of 964 2524 hyperComwin.exe 64 PID 2524 wrote to memory of 964 2524 hyperComwin.exe 64 PID 2524 wrote to memory of 964 2524 hyperComwin.exe 64 PID 964 wrote to memory of 1536 964 cmd.exe 66 PID 964 wrote to memory of 1536 964 cmd.exe 66 PID 964 wrote to memory of 1536 964 cmd.exe 66 PID 964 wrote to memory of 1696 964 cmd.exe 67 PID 964 wrote to memory of 1696 964 cmd.exe 67 PID 964 wrote to memory of 1696 964 cmd.exe 67 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f1b10a1c174cb19fe8f439044e6f447a22f357878f8b65d3e0593aab67672d1N.exe"C:\Users\Admin\AppData\Local\Temp\6f1b10a1c174cb19fe8f439044e6f447a22f357878f8b65d3e0593aab67672d1N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\MsSession\Ov1RwD.vbe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\MsSession\K37wJmF1HmUF8ALyjA8MpCp.bat" "4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\MsSession\hyperComwin.exe"C:\MsSession\hyperComwin.exe"5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\P7TAZNONsP.bat"6⤵
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:1536
-
-
C:\Program Files\Java\jdk1.7.0_80\jre\bin\dtplugin\smss.exe"C:\Program Files\Java\jdk1.7.0_80\jre\bin\dtplugin\smss.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1696
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\explorer.exe"C:\Users\Admin\AppData\Local\Temp\explorer.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2868
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 9 /tr "'C:\Windows\fr-FR\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1148
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Windows\fr-FR\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1788
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 13 /tr "'C:\Windows\fr-FR\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1520
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Mail\fr-FR\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2564
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Mail\fr-FR\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1552
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Mail\fr-FR\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2624
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 5 /tr "'C:\Program Files\Java\jdk1.7.0_80\jre\bin\dtplugin\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2964
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files\Java\jdk1.7.0_80\jre\bin\dtplugin\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1872
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 14 /tr "'C:\Program Files\Java\jdk1.7.0_80\jre\bin\dtplugin\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2904
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 14 /tr "'C:\MsSession\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1088
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\MsSession\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2992
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 13 /tr "'C:\MsSession\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2324
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 8 /tr "'C:\MsSession\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1028
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\MsSession\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1280
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 8 /tr "'C:\MsSession\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:484
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Windows\Temp\Crashpad\reports\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:768
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\Temp\Crashpad\reports\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2252
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Windows\Temp\Crashpad\reports\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2144
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 14 /tr "'C:\MsSession\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2420
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\MsSession\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2616
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 6 /tr "'C:\MsSession\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2148
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:840
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:448
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2168
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2028
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\MSOCache\All Users\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1000
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1340
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30B
MD5fa3ead269fc71745ff9e202da56f658e
SHA15d2662e79f1e992c0c9f72c050cc676df0f3cdde
SHA2561cf1a92d3e3ce17a13d4827deb0cdb9f89a40116905980b547d7f954d59040a7
SHA5129e3c2ea4326648905360005b2aa95fb0e0935dc641b32af56446abf2bd69e9749c92f22e6eab4240da6505ffee6c1c3f5ed4ab6ac945f59fee2835aa2f9ec347
-
Filesize
209B
MD5f5a3f2ada233639fa06802ff18569f99
SHA1da11e9ad7bda556c74204c32691f3ec5efe8b6a5
SHA2563558ba240c76b6de27cdc3ac9370d6b50774aa2d5d5e3fe6a697e971e832aef9
SHA512ab223924c713a6551ded2a1e86d70533d7c1b8d5155f0d12b3b9e7fbc928ead6c452d3112484a6974b3be94b937a333d2b5f3f8852b0a21793d160689aca3ba9
-
Filesize
224B
MD588b9f5d767cff4b79b284fdb66a5a3b1
SHA166f6052a946c7015ac89aa95c3ecc3dc44e21602
SHA256de34836038640868db4848548597dfaa6cf79024d5acc953a2490c4408df62aa
SHA5126fbfaf533d526cfd259f5be3048e5a687b90f78a6a21acdbf16fdf6c20fdd90db934cb45361ce79f70a240dadfa8989ffd99d9cb97aeb9465ac149f75848bf9f
-
Filesize
130KB
MD5f27a284ef9b018cdd2a98a7b78ccdcb3
SHA167e260b11e6227c18cae8925b4f6899103c607f2
SHA256af86dc3f76d39b67b967a3b714e9e70ed43eec8d3871e9691cb45d84372b53fb
SHA5129a8811f13517748539308a70933b126a3348407f397bf30f903019379f927532c64015853b94acf21bdbc554d638a0265d4394d026e289103db06fe93fe5524b
-
Filesize
2.3MB
MD582fcc473fb802d134540a4d3bc9ddc06
SHA1d879feb817639baeeef685261d8574ab7944f8b2
SHA256f6cf6f23a7d27460b34f9ead8e72584a706ae1e986f3fa3920c51fbd0d6f93d0
SHA5126a67c4b0d98c04c8a86bdd7d3f6f72e1b0f7e3718c58c22a30004ac55c60dc53a36fc764bdee79d8aab981b863c203992abbaaaca788d200c9456ff3d0319cf2
-
Filesize
2.6MB
MD5eb81df2c7222c48ef46c781d460c83b9
SHA1c7fe4682e2c1bc5cc55c2913600f8950fe955129
SHA2561594a7f6707f01d3f1688f726af842940fe96fe700f99df23a3d8ec6909e4b13
SHA5126ce26f9d1f1f8f10d8dae13132217ca8aa2d42e98475ee0543f1cdd35f0a06f824f5ef8ab0db03b25c15041560464aa73c545d91d13d6fda72131c7ccc2c7c5b